Proceedings of the 17th International Conference on Distributed Computing and Networking最新文献

筛选
英文 中文
Conversational intelligence analysis 会话智能分析
Alice Toniolo, A. Preece, William M. Webberley, T. Norman, Paul Sullivan, Timothy Dropps
{"title":"Conversational intelligence analysis","authors":"Alice Toniolo, A. Preece, William M. Webberley, T. Norman, Paul Sullivan, Timothy Dropps","doi":"10.1145/2833312.2849568","DOIUrl":"https://doi.org/10.1145/2833312.2849568","url":null,"abstract":"Social networks foster the development of social sensing to gather data about situations in the environment. Making sense of this information is, however, a challenge because the process is not linear and additional sensed information may be needed to better understand a situation. In this paper we explore how two complementary technologies, Moira and CISpaces, operate in unison to support collaboration among human-agent teams to iteratively gather and analyse information to improve situational awareness. The integrated system is developed for supporting intelligence analysis in a coalition environment. Moira is a conversational interface for information gathering, querying and evidence aggregation that supports cooperative data-driven analytics via Controlled Natural Language. CISpaces supports collaborative sensemaking among analysts via argumentation-based evidential reasoning to guide the identification of plausible hypotheses, including reasoning about provenance to explore credibility. In concert, these components enable teams of analysts to collaborate in constructing structured hypotheses with machine-based systems and external collaborators.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125011507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Finding occupancy in buses using crowdsourced data from smartphones 利用智能手机的众包数据查找公交车的占用情况
Megha Chaudhary, A. Bansal, D. Bansal, B. Raman, K. Ramakrishnan, N. Aggarwal
{"title":"Finding occupancy in buses using crowdsourced data from smartphones","authors":"Megha Chaudhary, A. Bansal, D. Bansal, B. Raman, K. Ramakrishnan, N. Aggarwal","doi":"10.1145/2833312.2833460","DOIUrl":"https://doi.org/10.1145/2833312.2833460","url":null,"abstract":"In the present scenario, developing countries like India are facing huge traffic congestion problems. Commuters have to wait long hours for arrival of buses, and when the bus arrives it is often found to be overcrowded, causing inconvenience in the commuters and discouraging them to use public transit system. The ITS(Intelligent Transport System) developed so far does provide arrival time of buses in real time but such systems are rare which provide the passenger occupancy in real time. Most of such installations use extortionate devices like passenger counting devices, cameras etc installed on the buses and at the bus stops. In this paper we propose a cost effective user participation based mode of collecting information about occupancy level of public transportation system using the potential of smartphones. Smartphones have inbuilt sensors like GPS which can be used to extract locational intelligence of the commuters. Hence, information gets crowdsourced from commuters and they themselves can provide information about occupancy level of a bus using their smartphones. The information so collected is stored in a historical database which is analyzed and processed to obtain occupancy level patterns for different routes on different days. The patterns observed are used to make predictions of occupancy level in a bus. Our results show that it is possible to achieve an accuracy to a level of 91.86 percent.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"875-877 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123651171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Stability and optimization of DNS-based request redirection in CDNs cdn中基于dns的请求重定向的稳定性与优化
W. Benchaita, S. Ghamri-Doudane, S. Tixeuil
{"title":"Stability and optimization of DNS-based request redirection in CDNs","authors":"W. Benchaita, S. Ghamri-Doudane, S. Tixeuil","doi":"10.1145/2833312.2833455","DOIUrl":"https://doi.org/10.1145/2833312.2833455","url":null,"abstract":"Content Delivery Network (CDN) solutions have been progressively integrated to many network infrastructures. However, they show technological limitations when dealing with an increasing number of bandwidth-hungry and demanding applications. One of the most effective ways to improve the performance of a CDN is to efficiently manage its traffic by implementing relevant request routing solutions. To this end, we present in this paper a flexible scheme and an optimization algorithm, based on Lyapunov theory, for request routing in CDNs. Our online approach provides a stable quality of service to clients, while improving content delivery delays. It also reduces data transport costs for operators and outperforms existing techniques in terms of peak traffic management.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115028284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Local checkability, no strings attached 本地可检查性,没有附加条件
Klaus-Tycho Förster, Thomas Luedi, J. Seidel, Roger Wattenhofer
{"title":"Local checkability, no strings attached","authors":"Klaus-Tycho Förster, Thomas Luedi, J. Seidel, Roger Wattenhofer","doi":"10.1145/2833312.2833315","DOIUrl":"https://doi.org/10.1145/2833312.2833315","url":null,"abstract":"In this work we study local checkability of network properties like s-t reachability, or whether the network is acyclic or contains a cycle. A structural property S of a graph G is locally checkable, if there is a prover-and-verifier pair (P, V) as follows. The prover P assigns a label to each node in graphs satisfying S. The verifier V is a constant time distributed algorithm that returns Yes at all nodes if G satisfies S and was labeled by P, and No for at least one node if G does not satisfy S, regardless of the node labels. The quality of (P, V) is measured in terms of the label size. We obtain (asymptotically) tight bounds for the bit complexity of the latter two problems for undirected as well as directed networks, where in the directed case we consider one-way and two-way communication, i.e., we distinguish whether communication is possible only in the edge direction or not. For the one-way case we obtain a new asymptotically tight lower bound for the bit complexity of s-t reachability. For the two-way case we devise an emulation technique that allows us to transfer a previously known s-t reachability upper bound without asymptotic loss in the bit complexity.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115348057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A study on Singapore haze 新加坡雾霾研究
B. Dai, Kasthuri Jayarajah, Ee-Peng Lim, Archan Misra, Shriguru Nayak
{"title":"A study on Singapore haze","authors":"B. Dai, Kasthuri Jayarajah, Ee-Peng Lim, Archan Misra, Shriguru Nayak","doi":"10.1145/2833312.2849569","DOIUrl":"https://doi.org/10.1145/2833312.2849569","url":null,"abstract":"In 2015, Singaporean have experienced one of the worse air pollution crises in history. With datasets from a well-known photo sharing social network, we analyze how this haze affects Singaporean's daily life. We will share our preliminary results in this paper.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117004601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incremental time series algorithms for IoT analytics: an example from autoregression 物联网分析的增量时间序列算法:一个来自自回归的例子
D. Mukherjee, Suman Datta
{"title":"Incremental time series algorithms for IoT analytics: an example from autoregression","authors":"D. Mukherjee, Suman Datta","doi":"10.1145/2833312.2849556","DOIUrl":"https://doi.org/10.1145/2833312.2849556","url":null,"abstract":"The Internet of Things (IoT) is emerging as an important application area for time series statistical analysis and data mining of time series. As the volume of sensor data is high, time series analysis of sensor data is a problem of processing large datasets. Moreover, the IoT platforms have to simultaneously process multiple jobs on the same infrastructure. Processing such large datasets requires large amount of memory. To alleviate this problem, we propose use of incremental algorithms. Incremental algorithms can be used for both batch and streaming applications. In this paper, we show an incremental algorithm for an example time series analysis algorithm viz. autoregression. We describe a memory efficient autoregression algorithm and show the memory footprint reduction achieved by using this incremental algorithm.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Collaborative cellular tail energy reduction: feasibility and fairness 协同元胞尾能量削减:可行性与公平性
G. D. Silva, B. Chen, M. Chan
{"title":"Collaborative cellular tail energy reduction: feasibility and fairness","authors":"G. D. Silva, B. Chen, M. Chan","doi":"10.1145/2833312.2833451","DOIUrl":"https://doi.org/10.1145/2833312.2833451","url":null,"abstract":"While cellular interfaces are known to be main power consumers in smartphones, our measurements reveal that surprisingly, due to cellular tail effect, a substantial ratio of energy drain comes from the low-frequency, low-data-rate background traffic. To reduce cellular tail energy use, existing solutions either require changing application behavior or assume the availability of low-level control of cellular interface (e.g., fast dormancy). We propose a collaborative cellular tail energy reduction approach for background traffic, which opportunistically discovers neighbours using low-power Bluetooth radio and shares their cellular bandwidth. Our evaluation demonstrates up to 90% saving for background traffic energy consumption in urban settings. Furthermore, we define a rigorous fairness notion by adapting the generalized processor sharing concept. Our sharing scheduling algorithm uses this notion to achieve substantial energy saving while ensuring fairness for participating phones.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127884991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Debunking the myth that tight packing is energy conserving 揭穿密实包装节约能源的神话
Swetha P. T. Srinivasan, U. Bellur, R. Badrinath
{"title":"Debunking the myth that tight packing is energy conserving","authors":"Swetha P. T. Srinivasan, U. Bellur, R. Badrinath","doi":"10.1145/2833312.2833447","DOIUrl":"https://doi.org/10.1145/2833312.2833447","url":null,"abstract":"Energy takes about half the operational expenses of data centers making energy conservation a critical goal. Fine-grained control over frequency of processors aids in reducing power at the cost of performance degradation. Placing tasks on servers is formulated as a bin packing and tight packing is considered to be energy conserving as idle servers can be shut down. However, we reveal that due to neglecting task deadline and operating at higher frequency leads to higher energy consumption compared to distributing of tasks over larger number of machines at lower frequencies. In this paper, we explore how to provision tasks in an energy-optimal manner. We show that task-based provisioning is a variable-sized bin packing problem and analyze energy efficiency of 14 classical and proposed heuristics for different distributions of task deadline requirements. We establish that tight packing leads to higher energy usage and we need to consider the task deadline while provisioning. Our heuristics saves as much as 65% energy compared to existing greedy heuristics for an instance of provisioning.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A cloud security framework for a data centric WSN application 用于以数据为中心的WSN应用程序的云安全框架
Sayantani Saha, Rounak Das, Suman Datta, S. Neogy
{"title":"A cloud security framework for a data centric WSN application","authors":"Sayantani Saha, Rounak Das, Suman Datta, S. Neogy","doi":"10.1145/2833312.2849559","DOIUrl":"https://doi.org/10.1145/2833312.2849559","url":null,"abstract":"Data centric applications like remote healthcare application designed on a WSN-Cloud computing integrated architecture requires attention to its secure data management mechanism. A huge amount of data is generated in a health care application, which needs to be managed efficiently so that fast and reliable data communication and access can take place among the end users. In this research work we have proposed a flexible security model especially for data centric applications in cloud computing based scenario. This security model ensures data confidentiality, data integrity and fine grained access control to the application data. The objective of this work is to propose a secure framework to assist users at remote locations by considering the interoperability among different security solutions.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Evacuating two robots from multiple unknown exits in a circle 从多个未知出口疏散两个机器人
J. Czyzowicz, S. Dobrev, Konstantinos Georgiou, E. Kranakis, Fraser MacQuarie
{"title":"Evacuating two robots from multiple unknown exits in a circle","authors":"J. Czyzowicz, S. Dobrev, Konstantinos Georgiou, E. Kranakis, Fraser MacQuarie","doi":"10.1145/2833312.2833318","DOIUrl":"https://doi.org/10.1145/2833312.2833318","url":null,"abstract":"Distributed on a unit circle are k exits. Two autonomous mobile robots are placed on the circle. Each robot has a maximum speed of 1 and the robots can communicate wirelessly. The robots have a map of the domain, including exits, but do not have knowledge of their own initial locations on the domain, rather they only know their relative distance. The goal of the evacuation problem is to give an algorithm for the robots which minimizes the time required for both robots to reach an exit, in the worst case. We consider two variations of the problem depending on whether the two robots have control over their initial distance. When the initial distance of the robots is part of the input (i.e. no control), we show that simple algorithms exist which achieve optimal worst case evacuation times for the cases where: the robots begin colocated with an arbitrary distribution of the exits; and when the exits are either colocated or evenly spaced, with arbitrary starting positions of the robots. We also give upper and lower bounds on the problem with arbitrary exit distribution and starting positions of the robots. For the problem where robots can choose their initial distance (with knowledge of, but not control over the distribution of exits), we propose a natural family of algorithms parameterized by the maximum distance between any two exits.","PeriodicalId":113772,"journal":{"name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131553510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信